Eternal Vault

The post-quantum heirloom your great-grandchildren will open.

Pay once. Preserve up to 1,000 years. Dual-signed with Ed25519 and ML-DSA-65. Inheritable across generations, designed to outlast Henedo itself.

Not a time capsule. An heirloom.

Most people think of legacy storage as a locked box for the future. The Eternal Vault is the opposite: your designated inheritors hold valid decryption keys from the day you seal it. Up to 1,000 years is a preservation guarantee, not a lock timer.

At sealing, you choose either instant access (inheritors can decrypt immediately, perfect for gifts, family records, shared photos) or dead-man-gated access (same 5-week cascade as the Living Vault).

What your heirs actually see

"A folder of files for descendants" is a fair critique of any legacy product that ends at storage. The Eternal Vault Access experience is engineered the opposite way, a chronological story, not a directory listing.

01

Personal message

Your introduction or final words. The first pane the inheritor sees, before any file or stat. The first thing they encounter is you, not a directory.

02

Journal viewer

Chronological entries with native voice and video playback. Years of weekly voice notes accumulate into a 100-entry life narrative your heirs can play in order.

03

File browser

Documents organized by folder with search and per-file inheritor key unwrapping. Reachable after the human-touch panes, not before.

04

Stats cards

Total photos, voice minutes, video minutes, documents, so they understand the scope before they start.

05

Per-recipient routing

Your spouse sees what you tagged for them; your child sees what you tagged for them. Routing is encrypted client-side; the server never knows who got what.

Every file carries its story into the seal

Each file you add to an Eternal Vault keeps the written note and the recorded voice memo you attached to it in the Living Vault. At sealing time, the note text is bound into the EVAK-encrypted manifest and the voice memo audio is re-encrypted under the same EVAK and stored as a sibling blob inside the vault. Both are covered by the SHA3-512 vault hash and the hybrid Ed25519 + ML-DSA-65 (NIST FIPS 204) signature that protects the rest of the manifest.

The result: in 80 or 200 or 500 years, when a great-grandchild opens the vault, they don't just see "Property_Deed_2026.pdf" — they see your written note explaining why the house mattered and they hear the 30-second voice memo you recorded when you scanned it. Folders carry the same payload: a "Family Photos" folder can have a recorded intro that plays before any file inside is opened. Documents become biography.

Inheritor decryption is identical to file decryption — no extra key, no second prompt. Once they unlock the vault with their card + email split, the same EVAK that decrypts every file also decrypts every note and every voice memo. The post-quantum guarantee covers them too.

The multi-generational legacy chain

A sealed Eternal Vault can be claimed by an inheritor who has their own Henedo account. They can then seal their own Eternal Vault on top of it, which their descendants can chain forward in turn.

Great-grandfather (2026) → [Financial records + letter to future family]
    └── Son links his account (2058) → seals own vault, chains to father
        └── Grandson links his account (2085) → seals own vault, chains to both
            └── Great-granddaughter (2110) → sees the entire chain

Each generation inherits not just documents but a verified, signed record of every ancestor who used the platform.

Post-quantum by design

Every Eternal Vault carries:

  • Ed25519 signature, classical, for fast verification today.
  • ML-DSA-65 signature, NIST FIPS 204 post-quantum, for verification after large quantum computers arrive.
  • SHA3-512 content hash, post-quantum-resistant integrity.
  • AES-256-GCM encryption, 128-bit post-quantum security under Grover.

Future verifiers need only one of the two signatures to hold. This is how you build something that lasts.

Preservation methodology

"Up to 1,000 years" is not a marketing promise, it is a five-layer engineering commitment. Each layer is independently meaningful and each closes a different failure mode.

01 — Layer

Cryptographic durability

AES-256-GCM (Grover-resistant), Argon2id (hash-based, immune to Shor), ML-DSA-65 (NIST FIPS 204), SHA3-512 (post-quantum integrity hash). A future verifier with only the ciphertext, the public hash, and the spec can verify integrity without us.

02 — Layer

Format durability

Each vault embeds a self-describing crypto manifest: algorithms, parameters, library versions. Decoding requires only the spec, not Henedo. The manifest is human-readable and printable.

03 — Layer

Active storage preservation

Geo-redundant primary storage across multiple regions on a current-generation cloud object store, with continuous SHA-3 fixity checks and a ~10-year hardware-refresh cycle that migrates drives, formats, and infrastructure to current technology — the discipline used by the Library of Congress, national archives, and other archival institutions (ISO 14721 / OAIS, PREMIS). On top of that, optional M-DISC, a rock-like inorganic optical medium tested per ISO/IEC 10995:2011/ECMA-379 and rated for up to 1,000 years (U.S. DoD projection), is the extra redundancy layer — ship it once, your heirs hold it forever.

04 — Layer

Institutional durability

The one-time purchase is held in a capital reserve sized so storage costs decline ~50% every 5 years (Kryder/cloud-storage trends) without depleting principal. The math is published. If Henedo ever winds down, the trustee transfers the manifest log to an OAIS-conformant successor (firm to be named when contracted).

05 — Layer

User-side defence

The M-DISC plus the public crypto spec is preservation independent of any institution. Customers who want zero institutional trust buy the M-DISC. The portability page shows the exact decrypt-without-Henedo recipe.

Built to outlast the platform

Your Eternal Vault doesn't depend on Henedo being here in 2126.

The Living Vault is operated by Henedo: we run the platform, gate the access, and maintain the servers. That is fine, the Living Vault is meant to disappear after it delivers. The Eternal Vault is engineered the opposite way. With the M-DISC, the printed crypto spec, and your inheritor's key, the vault is decryptable on any computer running standard AES-256-GCM and Argon2id. No Henedo website, no Henedo servers, no Henedo employees required.

We treat this as a customer-protective design choice, not a hedge. The full recipe is on the portability page: print it, hand it to your heirs alongside the M-DISC, and the vault is theirs forever.

Active preservation: the primary storage layer

What actually keeps an Eternal Vault alive across a century is not any single medium — it is active preservation. The primary storage layer is geo-redundant: encrypted blobs replicated across multiple regions on a current-generation cloud object store, with continuous SHA-3 fixity checks that detect silent corruption and re-replicate automatically. Roughly every 10 years, the underlying drives, formats, and infrastructure are migrated to current technology, the way the Library of Congress, national archives, and other serious archival institutions do it (formalised by ISO 14721 / OAIS and the PREMIS preservation metadata standard). The endowment built into the one-time price funds those decade-by-decade refreshes for the full duration you bought.

M-DISC physical backup: the extra redundancy layer

Optional add-on from $59 — sits on top of the actively-preserved primary store as an extra safety layer. We burn your encrypted vault, and a printed copy of the crypto spec, to an M-DISC optical medium tested per ISO/IEC 10995:2011/ECMA-379 and rated for up to 1,000 years (U.S. Department of Defense projection), then ship it to you. Even if every cloud provider disappears, the physical disc survives, and your heirs can decrypt it with standard tools. M-DISC is a redundancy layer, never the only copy of your data.

FAQ

A sealed, permanent, cryptographically signed snapshot of your life designed to survive up to 1,000 years. Unlike the Living Vault (which self-destructs after releasing to contacts), the Eternal Vault is an inheritable heirloom. Future generations can link it to their own Henedo account and build a multi-generational legacy chain.

Five engineered layers, not a single point of trust. (1) Cryptographic durability: AES-256-GCM, Argon2id, ML-DSA-65, SHA3-512, all NIST-standardised. (2) Format durability: a self-describing crypto manifest is embedded in the vault. (3) Active storage preservation: geo-redundant primary storage across multiple regions on a current-generation cloud object store, with continuous SHA-3 fixity checks and a ~10-year hardware-refresh cycle that migrates drives, formats, and infrastructure to current technology — the discipline used by the Library of Congress, national archives, and other archival institutions, formalised by ISO 14721 (OAIS) and PREMIS. M-DISC sits on top as an extra redundancy layer (ISO/IEC 10995:2011/ECMA-379, rated up to 1,000 years per U.S. DoD projection), never the only copy. (4) Institutional durability: an endowment model with disclosed math and an OAIS-conformant successor custodian. (5) User-side defence: with the M-DISC and the public spec, your heirs can decrypt the vault even if Henedo no longer exists.

No — that is exactly the failure mode active preservation is designed to avoid. Hard drives degrade in 3–5 years, SSDs lose charge without power, and entire storage formats become obsolete in a generation. Henedo treats the storage layer as a living archive: geo-redundant replication, continuous SHA-3 fixity checks, and a ~10-year hardware/format refresh cycle aligned to ISO 14721 (OAIS) and PREMIS — the same model national archives use. M-DISC is an extra redundancy layer on top, not the primary medium. Active preservation is what carries an archive across centuries; passive cold storage is what kills consumer "lifetime" services.

Yes, by design. Every Eternal Vault embeds a self-describing crypto manifest. With the M-DISC redundancy backup, the printed crypto spec, and their own key, your heirs can decrypt the vault on any computer running standard AES-256-GCM and Argon2id — no Henedo server, website, or app required. See the portability page for the exact recipe.

Our first formal audit is scheduled for Q3 2026. The architecture is already open for review today: SECURITY.md and BACKEND_ARCHITECTURE.md are public, every production build is signed and verifiable on the transparency page, and the bug bounty pays $5K to $25K for confirmed issues. When the audit firm is contracted, we name them publicly.

Yes, the layers that matter are shipped today. Dual-signed with Ed25519 (classical) and ML-DSA-65 (NIST FIPS 204, post-quantum) via @noble/post-quantum v0.2.x. Data encryption uses AES-256-GCM which retains 128-bit security against Grover's algorithm. Vault integrity is hashed with SHA3-512 (256-bit post-quantum security).

Starts at $499 one-time for 100 years at 100 GB, that's $4.99 per year. Scales up to $1,349 for 500 years at 1 TB. No subscription, no renewals. See the full pricing matrix on the pricing page.

Yes. Each inheritor receives a unique per-inheritor key at sealing time via split-key delivery (24 characters on an engraved metal card, 20 characters by email). Chain-forward access lets descendants who inherit a vault claim it in their own account.

Start your family’s first eternal record

$499 for 100 years. $4.99 per year. One sealed vault, open-standard, signed forever.